SEC575 All Weeks Discussions Latest 2019 November

Question # 00607312
Subject: Education
Due on: 12/20/2019
Posted On: 12/20/2019 08:56 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

SEC575 Information Security Law and Ethics

Week 1 Discussion

DQ1 JURISDICTION OVER WEBSITES

Read Yahoo v. La Lique (Links to an external site.) and Mink v. AAAA Development LLC (Baumer, pp. 44–46), and then discuss the factors that were used to determine whether each court had jurisdiction over non-resident website operators. What business factors should enter into development of commercial websites and decisions about whether to subject a company to long-arm jurisdiction?

DQ2 IMPACT OF TECHNOLOGY ON THE LAW

All websites are equally accessible on the Internet, no matter where a site's business sponsor is located. Consequently, foreign websites are accessible to people cruising the Internet.

Suppose a foreign website sells drugs that are not approved by regulatory agencies for sale to citizens of another country. Do you think that website has a duty to be familiar with drug laws throughout the world? Why or why not? In addition, do you think the owners of the website have committed a crime? Why or why not?

 

SEC575 Information Security Law and Ethics

Week 2 Discussion

DQ1 TO SPAM OR NOT TO SPAM

You have just graduated from Keller Graduate School and decide that you want to start an Internet business. You have limited capital but need to market your product. Someone suggests that you can purchase 500,000 Internet addresses at an extremely low cost. You have always hated spam but realize that this is a great way to reach a half a million potential customers both quickly and cheaply. You recognize that many, if not most, of the recipients will find your spam message a nuisance. Focusing on the legal issues that you believe affect your actions, discuss what you would do.Read the excerpts of the CAN-SPAM Act (Links to an external site.).

DQ2 TAXATION AND THE INTERNET

Class, it always comes down to taxes--the state wants them and you the consumer would just as soon pass on sales taxes if you are ordering online rather than at a brick and mortar store.

What is the state of taxing of Internet sales? Read Case 23-1: National Bellas Hess, Inc. v. Department of Revenue of the State of Illinois at p. 752 and the accompanying discussion at pp. 750-56 of our Text. Also read the linked 1992 Quill Corp v. North Dakota (Links to an external site.) decision which served as the basis for more than a decade of debate on taxation of Internet transactions.  And, finally, please read South Dakota v. Wayfair (Links to an external site.), a 2018 decision which expressly overruled National Bellas Hess and Quill Corp decisions.

 

SEC575 Information Security Law and Ethics

Week 3 Discussion

DQ1 SHRINK-WRAP. BOX-TOP, AND CLICK-WRAP AGREEMENTS

Shrink-wrap, box-top, and click-wrap agreements are inherent to e-commerce. How you feel about them often depends on whether you are the vendor or purchaser. What are the best practices to assure shrink-wrap, box-top, and click-wrap agreements are legal? What are the best ethical practices that the e-commerce industry should adopt?

DQ2 ATTRIBUTION IN AN E-COMMERCE WORLD

In a world of one-click acceptance, vendors face real challenges in determining whether the clicker is in fact the offeree to whom the offer is made. What are some steps or procedures vendors can adopt to establish attribution? What happens if a consumer clicks on the wrong button or did not intend to click at all? What legal and ethical defenses should be available to e-commerce customers?

 

SEC575 Information Security Law and Ethics

Week 4 Discussion

DQ1 CONSTITUTIONAL RIGHTS AND BUSINESS

We tend to think of constitutional rights in terms of individuals--our rights to free speech, to worship or not worship as we see fit, our rights to be secure in our homes from unreasonable governmental intrusion and our rights as criminal defendants to a jury trial, to a competent attorney and the right against self-incrimination.

But a lot of these rights have relevance to business. And other rights such as the power of the federal government under the Commerce Clause and the right of governments to seize our property under eminent domain are critical to how businesses can profitably operate.

So let's jump into what should be a fascinating discussion

DQ2 INVASIONS OF PRIVACY IN CYBERSPACE

Americans have a high regard for privacy. This regard is codified in the Fourth Amendment to the U.S. Constitution, which guarantees the right of the people to be secure in their persons, houses, papers and effects against unreasonable search and seizure.

Is the Electronic Communication Privacy Act of 1986 sufficient to guarantee our rights to privacy in Internet and other electronic communications?  Or, in the aftermath of 9/11 and the war on terror, should we reasonably expect government inroads into privacy and the use of snooping tools such as Carnivore?

 

SEC575 Information Security Law and Ethics

Week 5 Discussion

DQ1 INTELLECTUAL PROPERTY IN AN INTERNET AGE

The Internet revolution brought with it a flood of intellectual property issues. We all know about the rise and fall of Napster and the efforts of next-generation file-sharing programs to build pure person-to-person networks. Our text discusses DeCSS software that can defeat anticopying protections on DVDs. Internationally, the problem has exploded, with knock-off software programs available throughout China and much of the Far East.

What can intellectual property owners, particularly the creators of music and movie entertainment, do to protect their copyrights?

Are international trade agreements likely to be effective in protecting copyright holders?

DQ2 "SUCK SITES," FREE SPEECH, AND METATAGS

The Internet is the new soapbox anyone can use to voice an opinion. With that being the case, can a website that is critical of a business use the trademarked name of the business?   Can those critical of the commercial practices of a business use the business's name and also employ metatags to draw browsers of those who input the business's name in the search engine?

Which value should receive the highest weight—the right of a company to protect its trademark or the right of unfettered free speech in the marketplace?

 

SEC575 Information Security Law and Ethics

Week 6 Discussion

DQ1 ETHICAL HACKER

Your CEO reads an article that a German firewall company, Securepoint, has hired the author of the Sasser worm. She also reads articles from security experts who are in support of or against the hiring. She concludes that it would be a good idea for your company to hire a local hacker to work for your company. She asks you, the company's Chief Information Security Officer, for your opinion. Please advise whether you agree or disagree with the CEO, specifically addressing the ethical issues involved. (suggested reading: Baumer, pp. 725–726)

DQ2 CYBERETHICS

Using your favorite Search Engine, locate a website devoted to cyber ethics. Provide the URL and a summary of the ethical principles promoted by the website.

 

SEC575 Information Security Law and Ethics

Week 7 Discussion

DQ1 COMPUTER VIRUSES

Computer viruses can cause havoc when the infection hinders or disables personal or business computers. Naturally, the cost of dealing with viruses impacts major companies whenever an infection occurs and is high in both monetary and manpower expenditures. But even the small businessperson or casual user can experience major inconvenience, anguish, and expense when infected. Does the law deal severely enough with those who spread viruses? Is there anything more that the government could do to protect citizens and businesses that use the Internet that would not be viewed as an invasion of citizens' rights? Now imagine that the next time you went to your personal computer it was useless because of a virus and had to be replaced, or that the next time you went to the computer lab on campus you found that a virus had disabled all computers on your campus for 6 months. Would your answer be different?

DQ2 THE INTERNET, PORN, AND FREE SPEECH

The attempt to regulate pornography and to develop definitions that do not run afoul of the First Amendment is expanding as the Internet becomes the number-one source for the dissemination of pornography. Attempts to regulate online pornography through the Communication Decency Act of 1996 and the Child Online Protection Act of 1998 have been struck down by the Supreme Court. What legal solutions are available to combat pornography? Are site-blocking tools an effective way to monitor the usage of the Internet by children?

Dot Image
GlobalTutor Posted By :
Questions: 3706 Tutorials: 3600
Tutorials for this Question

SEC575 All Weeks Discussions Latest 2019 November

Tutorial # 00606063
Posted On: 12/20/2019 08:57 AM
Feedback Score: Not rated yet!
Purchased By: 2
GlobalTutor
Posted By:
Questions:
3706
Tutorials:
3600
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of SEC575 All Weeks Discussions Latest 2019 November...
Attachments
SEC575_All_Weeks_Discussions_Latest_2019_November.zip (345.83 KB)

Great! We have found the solution of this question!

Related Questions
Research the web and find an appropriate incident related
Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business …
Chemical Reaction and A Nuclear Reaction
Chemical Reaction and A Nuclear Reaction Questions 1. Which type of radiation consists of a fast stream of negatively charged particles? (2 points) alpha particles beta particles gamma …
What is a Normal Family - As a teacher or support staff member
What is a Normal Family?  As a teacher or support staff member you will work with many different families throughout your career. Our perception of family generally comes from our experiences …
Extra Credit Discussion - What are some takeaways
Extra Credit Discussion After reviewing this week's content, you may participate in this discussion for extra credit and learning. It will be worth up to 10 points depending on your p …
As part of the control phase of the improvement project
Part 1: A.  As part of the control phase of the improvement project, create a process control plan by doing the following: 1.  Define measures or key indicators that will be used to tr …
Public Narratives a Case for The Education of Refugees Essay
BU Public Narratives a Case for The Education of Refugees Essay https://www.independent.co.uk/voices/child-refugee... This is the public narratives I want to focus on.  The requirements …
RWS305W Module 4 The Pessimist Student Prompt
RWS305W SDSU Mod 4 The Pessimist Student Prompt Paper RWS 305W Online Journaling: An Exercise in Revision and Reflection  This summer we have been journaling twice weekly to push our thinki …
The Role Played by Social Media Platforms as Part
The Role Played by Social Media Platforms as Part of The Corrections Essay Prior to beginning work on this discussion, review a state’s department of corrections Twitter (Links to a …
Hypothetical Situation that Exhibits the Ethical Dilemma
Hypothetical Situation that Exhibits the Ethical Dilemma Select one of the following ethical dilemma topics for your analysis: Appropriate use of force Torture in the war on terror Crackd …
Ethnographic Methods to Gather Data for a Research Project
Ethnographic Methods to Gather Data for a Research Project Questions 1. How did the author gather data for this project?  Is this a  quantitative or qualitative project?  Would you s …
Recent Questions
Examine the several different types of data insights that occur
Question Examine the several different types of data insights that occur in big data analytics:  ? Offer novel knowledge  ? Provide causation relationships  ? Add a competit …
Computer science - Is virtualisation cost effective
Computer science question Is virtualisation cost effective and does it support green IT? Contents Introduction Is Virtualisation cost effective? Running out of space? Needing Virtualisa …
Studying Computing involves developing both subject
Studying Computing involves developing both subject-specific and transferable skills. Describe the skills you have used prior to university, and discuss how you would expect those skills to develop wh …
Computer Science - Discuss the critical characteristics
Computer Science Question Assignment 1 - Question 1: Discuss the critical characteristics of communication channels in data communications. Explain how bandwidth and communication medium affe …
Walden NURS6512N Week 3 Quiz Latest 2024
NURS6512N Advanced Health Assessment and Diagnostic Reasoning Week 3 Quiz A patient states feeling like they wasted time and money trying to lose weight with no success. Which response by the n …
Walden NURS6512N Week 1 Quiz Latest 2024
NURS6512N Advanced Health Assessment and Diagnostic Reasoning Week 1 Quiz   Question 1 Identify the false options about collecting gender identity and sexual orientation informatio …
GCU NRS445 Assignment Latest 2024
GCU NRS445 ASSIGNMENT Assessment Description The purpose of this assignment is to refine the PICOT question you developed in the discussion forum this week and begin evaluating literature tha …
GCU NRS445 Discussion (dq1+dq2) Latest 2024
GCU NRS445 DQ1 Assessment Description After reviewing the course textbook, summarize the history of nursing research. Discuss the importance of nursing research as it relates to applying evid …
Aspen DNP845 Complete Course latest 2024
DNP845 Theoretical and Scientific Underpinnings Module 1 Journal  Reflect on The Essentials of Baccalaureate Education for Professional Nursing Practice. How have you previously met Essent …
Aspen DNP845 All Assignments latest 2024
DNP845 Theoretical and Scientific Underpinnings Module 1 Assignment Write a 1500-2000 word essay addressing each of the following points. Be sure to completely address all the questions for each …